Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
Advisories

No advisories yet.

Fixes

Solution

To secure the Access Manager 92xx, it is highly recommended to update to the latest FW, at least XAMB 04.06.212 RA.


Workaround

No workaround given by the vendor.

History

Mon, 26 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
Description Instead of typical session tokens or cookies, it is verified on a per-request basis if the originating IP address has once successfully logged in. As soon as an authentication request from a certain source IP is successful, the IP address is handled as authenticated. No other session information is stored. Therefore, it is possible to spoof the IP address of a logged-in user to gain access to the Access Manager web interface.
Title Insufficient Session Management in dormakaba access manager
Weaknesses CWE-291
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: SEC-VLab

Published:

Updated: 2026-01-26T16:00:07.304Z

Reserved: 2025-09-09T07:53:12.879Z

Link: CVE-2025-59101

cve-icon Vulnrichment

Updated: 2026-01-26T15:59:59.184Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T10:16:07.850

Modified: 2026-01-26T15:03:33.357

Link: CVE-2025-59101

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses